Real-time logics: complexity and expressiveness
Information and Computation - Special issue: selections from 1990 IEEE symposium on logic in computer science
The Semantics of Predicate Logic as a Programming Language
Journal of the ACM (JACM)
Contributions to the Theory of Logic Programming
Journal of the ACM (JACM)
Logic, Programming, and PROLOG
Logic, Programming, and PROLOG
A Formal Approach for Passive Testing of Protocol Data Portions
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Passive testing and applications to network management
ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
Log Auditing through Model-Checking
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A Runtime Monitoring and Validation Framework for Web Service Interactions
ASWEC '06 Proceedings of the Australian Software Engineering Conference
Network protocol system monitoring: a formal approach with passive testing
IEEE/ACM Transactions on Networking (TON)
Runtime Monitoring of Message-Based Workflows with Data
EDOC '08 Proceedings of the 2008 12th International IEEE Enterprise Distributed Object Computing Conference
Using formal specifications to support testing
ACM Computing Surveys (CSUR)
Synthesizing Monitors for Safety Properties: This Time with Calls and Returns
Runtime Verification
Formal methods: Practice and experience
ACM Computing Surveys (CSUR)
A passive testing approach based on invariants: application to the WAP
Computer Networks: The International Journal of Computer and Telecommunications Networking
From the IMS PoC service monitoring to its formal conformance testing
Mobility '09 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems
An Automated Passive Testing Approach for the IMS PoC Service
ASE '09 Proceedings of the 2009 IEEE/ACM International Conference on Automated Software Engineering
Fast testing of critical properties through passive testing
TestCom'03 Proceedings of the 15th IFIP international conference on Testing of communicating systems
The good, the bad, and the ugly, but how ugly is ugly?
RV'07 Proceedings of the 7th international conference on Runtime verification
Temporal Assertions with Parametrized Propositions*
Journal of Logic and Computation
Timed Extended Invariants for the Passive Testing of Web Services
ICWS '10 Proceedings of the 2010 IEEE International Conference on Web Services
Automated Runtime Verification for Web Services
ICWS '10 Proceedings of the 2010 IEEE International Conference on Web Services
Runtime Verification for LTL and TLTL
ACM Transactions on Software Engineering and Methodology (TOSEM)
Pattern-Based specification and validation of web services interaction properties
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
Passive testing – a constrained invariant checking approach
TestCom'05 Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating Systems
PSL model checking and run-time verification via testers
FM'06 Proceedings of the 14th international conference on Formal Methods
An EFSM-based passive fault detection approach
TestCom'07/FATES'07 Proceedings of the 19th IFIP TC6/WG6.1 international conference, and 7th international conference on Testing of Software and Communicating Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A formal distributed network monitoring approach for enhancing trust management systems
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Hi-index | 0.00 |
There is currently a high level of consciousness of the importance and impact of formally testing communicating networks. By applying formal description techniques and formal testing approaches, we are able to validate the conformance of implementations to the requirements of communication protocols. In this context, passive testing techniques are used whenever the system under test cannot be interrupted or access to its interfaces is unavailable. Under such conditions, communication traces are extracted from points of observation and compared to the expected behavior formally specified as properties. Since most works on the subject come from a formal model context, they are optimized for testing the control part of the communication with a secondary focus on the data parts. In the current work, we provide a data-centric approach for black-box testing of network protocols. A formalism is provided to express complex properties in a bottom-up fashion starting from expected data relations in messages. A novel algorithm is provided for evaluation of properties in protocol traces. Experimental results on Session Initiation Protocol (SIP) traces for IP Multimedia Subsystem (IMS) services are provided.